Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile application security system and method

a mobile application and security system technology, applied in the field of applications, can solve the problems of user access denied, user id and password system not considered the most secure, and it is extremely difficult for a different person to replicate the biometric characteristic of the authentic user

Active Publication Date: 2013-01-10
BOTTOMLINE TECH
View PDF11 Cites 65 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention is a system for authenticating the user of a computing device by using a combination of factors, including physical characteristics and behavioral patterns. The system includes an authentication server with an authorized user directory and an authentication application. The user sends a request for authentication to the server, which provides the unique identifier of the user and the unique depictions of the user with a unique fingerprint. The user then captures a continuous trace pattern on the device's touch screen and sends the data to the server for verification. The server matches the continuous trace pattern with the unique depictions in the user's directory to authenticate the user. The system ensures that the user's device ID and the unique depictions match, and the continuous trace pattern verification data includes at least one velocity verification value and a measured time stamp. The technical effect of the invention is to enhance the security of user authentication and prevent unauthorized access to the computing device.

Problems solved by technology

On the other hand, if the user ID does not match a valid user ID's or the password does not match the valid password stored in association with the user ID, the user is denied access.
User ID and password systems are not considered the most secure because it is based solely on the person purporting to be the authorized user having knowledge of the user ID and password.
Because certain biometric characteristics that are typically used for security are unique to each individual, it is extremely difficult for a different person replicate the biometric characteristic of the authentic user.
A challenge with use of biometrics for security and to restrict access to services is that biometric measuring devices are expensive and most biometric measuring devices are no readily portable.
More specifically, although the operator of a fraudulent web site can replicate the genuine website to induce the person to enter his or her user ID, the operator of the fraudulent website does not have access to the user's personally selected site key picture and therefore cannot replicate the genuine site's ability to display the personally selected site key in association with prompting the user to enter his or her password.
Because the typical user becomes accustomed to using the two step log-in process and seeing his / her personally selected site key picture on the genuine web site, the lack of two step log in process and / or the lack of seeing the personally selected site key on a fraudulent web site make its obvious to the user that the website may not be genuine and that he or she should not provide their password.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile application security system and method
  • Mobile application security system and method
  • Mobile application security system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049]The present invention is now described in detail with reference to the drawings. In the drawings, each element with a reference number is similar to other elements with the same reference number independent of any letter designation following the reference number. In the text, a reference number with a specific letter designation following the reference number refers to the specific element with the number and letter designation and a reference number without a specific letter designation refers to all elements with the same reference number independent of any letter designation following the reference number in the drawings.

[0050]It should also be appreciated that many of the elements discussed in this specification may be implemented in a hardware circuit(s), a processor executing software code / instructions which is encoded within computer readable media (volatile memory, non volatile memory, magnetic media, RAM, ROM, Flash, ect) accessible to the processor, or a combination...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for authenticating the user of a computing device comprises an authorized user directory. Each record is uniquely associated with an authorized user and includes at least a computing device ID value that is a globally unique value assigned to the authorized user's computing device, a group of unique depictions such as photographs, an identification of a key depiction. Portions of each image form fiducials recognizable by the user. The record further includes trace pattern verification data representing continuous trace strokes between pairs of the fiducials within the key depiction. To authenticate, the group of images are displayed to the user. The user must first select the key image and secondly trace continuous trace strokes between the pairs of fiducials to match the trace pattern verification data.

Description

TECHNICAL FIELD[0001]The present invention relates to security for applications operating on a computing device and more particularly to authenticating the user of a computing device.BACKGROUND OF THE INVENTION[0002]Authenticating a user of a computing device in order to provide access to to restricted electronic data or access to restricted services such as banking services is critical for securing data and preventing fraud.[0003]The most common system for authenticating a user is to require the user to enter a user ID and password combination. The password is then compared to a valid password that is stored in a secure location in association with the user ID.[0004]If the user ID and password tendered by the user matches the valid password stored in association with the user ID, the user is granted access to the restricted electronic data or systems. On the other hand, if the user ID does not match a valid user ID's or the password does not match the valid password stored in assoc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F12/14
CPCH04L63/083H04L63/08H04L63/0876G06F3/04883G06F21/31G06F21/32G06F21/36
Inventor MCLAUGHLIN, BRIAN SMITHGIL, LEONARDO B.TRACY, MARSHALL JOSEPHMITCHELL, ERIK VANGHNDIXON, JEFFREY TODD
Owner BOTTOMLINE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products